CVE-2025-11738: CWE-73 External Control of File Name or Path in dglingren Media Library Assistant
The Media Library Assistant plugin for WordPress is vulnerable to limited file reading in all versions up to, and including, 3.29 via the mla-stream-image.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary ai/eps/pdf/ps files on the server, which can contain sensitive information.
AI Analysis
Technical Summary
CVE-2025-11738 is a vulnerability identified in the Media Library Assistant plugin for WordPress, affecting all versions up to and including 3.29. The issue is due to improper handling of file names or paths in the mla-stream-image.php file, classified under CWE-73 (External Control of File Name or Path). This flaw allows unauthenticated attackers to perform limited arbitrary file reading, specifically targeting AI, EPS, PDF, and PS file types stored on the server. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. Attackers can leverage this to access sensitive documents that may contain confidential or proprietary information, potentially leading to data leakage. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, primarily due to the confidentiality impact without affecting integrity or availability. No patches or official fixes have been linked yet, and no known exploits have been reported in the wild. The vulnerability's exploitation vector is network-based with low attack complexity, increasing the risk for exposed WordPress sites using this plugin. Given the widespread use of WordPress and this plugin, the vulnerability poses a notable risk to organizations relying on these technologies for content management and media handling.
Potential Impact
The primary impact of CVE-2025-11738 is unauthorized disclosure of sensitive files stored on web servers running the vulnerable Media Library Assistant plugin. Organizations may suffer confidentiality breaches if attackers access proprietary documents, intellectual property, or sensitive client data contained within AI, EPS, PDF, or PS files. Although the vulnerability does not allow file modification or deletion, the exposure of sensitive information can facilitate further attacks such as social engineering, corporate espionage, or regulatory non-compliance. The ease of exploitation without authentication increases the threat surface, especially for publicly accessible WordPress sites. This can lead to reputational damage, legal liabilities, and loss of customer trust. The scope is broad due to the plugin's popularity, affecting small businesses, enterprises, and government websites using WordPress. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant risk if weaponized by attackers.
Mitigation Recommendations
1. Immediately restrict access to mla-stream-image.php by implementing web server rules (e.g., .htaccess or nginx configuration) to block unauthorized requests or limit access to trusted IP addresses. 2. Deploy Web Application Firewall (WAF) rules that detect and block attempts to exploit path traversal or arbitrary file read patterns targeting this plugin. 3. Monitor web server logs for unusual requests to mla-stream-image.php or access to AI, EPS, PDF, and PS files that could indicate exploitation attempts. 4. If possible, disable or remove the Media Library Assistant plugin until a security patch is released. 5. Follow vendor advisories closely and apply official patches or updates as soon as they become available. 6. Conduct an audit of sensitive files stored on the server to ensure minimal exposure and consider relocating sensitive documents outside the web root. 7. Educate site administrators about the risks and signs of exploitation related to this vulnerability. 8. Implement least privilege principles for file permissions to reduce the impact of unauthorized file access.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, France, Netherlands, Brazil, India
CVE-2025-11738: CWE-73 External Control of File Name or Path in dglingren Media Library Assistant
Description
The Media Library Assistant plugin for WordPress is vulnerable to limited file reading in all versions up to, and including, 3.29 via the mla-stream-image.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary ai/eps/pdf/ps files on the server, which can contain sensitive information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11738 is a vulnerability identified in the Media Library Assistant plugin for WordPress, affecting all versions up to and including 3.29. The issue is due to improper handling of file names or paths in the mla-stream-image.php file, classified under CWE-73 (External Control of File Name or Path). This flaw allows unauthenticated attackers to perform limited arbitrary file reading, specifically targeting AI, EPS, PDF, and PS file types stored on the server. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. Attackers can leverage this to access sensitive documents that may contain confidential or proprietary information, potentially leading to data leakage. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, primarily due to the confidentiality impact without affecting integrity or availability. No patches or official fixes have been linked yet, and no known exploits have been reported in the wild. The vulnerability's exploitation vector is network-based with low attack complexity, increasing the risk for exposed WordPress sites using this plugin. Given the widespread use of WordPress and this plugin, the vulnerability poses a notable risk to organizations relying on these technologies for content management and media handling.
Potential Impact
The primary impact of CVE-2025-11738 is unauthorized disclosure of sensitive files stored on web servers running the vulnerable Media Library Assistant plugin. Organizations may suffer confidentiality breaches if attackers access proprietary documents, intellectual property, or sensitive client data contained within AI, EPS, PDF, or PS files. Although the vulnerability does not allow file modification or deletion, the exposure of sensitive information can facilitate further attacks such as social engineering, corporate espionage, or regulatory non-compliance. The ease of exploitation without authentication increases the threat surface, especially for publicly accessible WordPress sites. This can lead to reputational damage, legal liabilities, and loss of customer trust. The scope is broad due to the plugin's popularity, affecting small businesses, enterprises, and government websites using WordPress. The lack of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a significant risk if weaponized by attackers.
Mitigation Recommendations
1. Immediately restrict access to mla-stream-image.php by implementing web server rules (e.g., .htaccess or nginx configuration) to block unauthorized requests or limit access to trusted IP addresses. 2. Deploy Web Application Firewall (WAF) rules that detect and block attempts to exploit path traversal or arbitrary file read patterns targeting this plugin. 3. Monitor web server logs for unusual requests to mla-stream-image.php or access to AI, EPS, PDF, and PS files that could indicate exploitation attempts. 4. If possible, disable or remove the Media Library Assistant plugin until a security patch is released. 5. Follow vendor advisories closely and apply official patches or updates as soon as they become available. 6. Conduct an audit of sensitive files stored on the server to ensure minimal exposure and consider relocating sensitive documents outside the web root. 7. Educate site administrators about the risks and signs of exploitation related to this vulnerability. 8. Implement least privilege principles for file permissions to reduce the impact of unauthorized file access.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-14T13:25:58.992Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f32a83bd206a5487a8965d
Added to database: 10/18/2025, 5:49:55 AM
Last enriched: 2/27/2026, 7:15:29 PM
Last updated: 3/23/2026, 7:13:01 PM
Views: 145
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.